• DocumentCode
    2651491
  • Title

    WANTED: a theft-deterrent solution for the pervasive computing world

  • Author

    Droz, Patrick ; Gülcü, Ceki ; Haas, Robert

  • Author_Institution
    IBM Zurich Res. Lab., Ruschlikon, Switzerland
  • fYear
    2000
  • fDate
    2000
  • Firstpage
    374
  • Lastpage
    379
  • Abstract
    This paper presents a new theft-deterrent system called WANTED. The system relies on credits and blacklists, with each protected device periodically requesting new credit in order to continue operating. The main features of WANTED are resistance to attacks, guaranteed privacy, and scalability. The client part is a hybrid system consisting of an untrusted software component and a trusted hardware component. This offers maximum flexibility, while keeping the hardware requirements low
  • Keywords
    authorisation; cryptography; mobile computing; tracking; WANTED; attack resistance; blacklists; credits; flexibility; guaranteed privacy; hybrid system; low hardware requirements; pervasive computing world; protected device; scalability; tamperproof cryptography hardware; theft-deterrent system; trusted hardware component; untrusted software component; Authentication; Cryptographic protocols; Cryptography; Hardware; Laboratories; Monitoring; Pervasive computing; Protection; Scalability; Transmitters;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Communications and Networks, 2000. Proceedings. Ninth International Conference on
  • Conference_Location
    Las Vegas, NV
  • ISSN
    1095-2055
  • Print_ISBN
    0-7803-6494-5
  • Type

    conf

  • DOI
    10.1109/ICCCN.2000.885517
  • Filename
    885517